Tempra
Server hardening tool. Single binary. Knowledge built-in.
Tempra is a security knowledge engine. It detects your system, knows what needs hardening based on CIS benchmarks, generates a plan, applies it with native OS tools, and verifies the result.
$ tempra scan
OS: Linux
Distribution: ubuntu
Version: 24.04
Init system: Systemd
Package manager: Apt
$ tempra plan
[+] SSH: Disable root login (CIS-5.2.10)
[~] SSH: Set MaxAuthTries to 4 (CIS-5.2.7)
[+] Firewall: Enable UFW with deny incoming (CIS-3.5.1.2)
[+] Fail2ban: Enable SSH jail (NIST-AC-7)
$ tempra apply
4 changes to apply. Continue? [y/N]
Knowledge engine
Knows what to harden. No playbooks to write.
Native tools
Uses apt, systemctl, ufw, sysctl. Installs nothing extra.
Plan / Apply / Verify
See what changes before they happen. Verify after.
Idempotent
Run it again. Same result. No surprises.
Install
curl -fsSL https://tempra.sh/install.sh | bash
Quick start
curl -fsSL https://tempra.sh/install.sh | bash
tempra scan
tempra plan
tempra apply
Four commands. Fresh server to hardened server.
Not an Ansible replacement
Ansible executes steps you write. Tempra already knows what to do. It's the difference between a compiler and a linter — one runs your code, the other knows what's wrong.